Vuln: PHP 'exif_process_IFD_in_MAKERNOTE' Out of Bounds Read Information...
PHP 'exif_process_IFD_in_MAKERNOTE' Out of Bounds Read Information Disclosure Vulnerability
View ArticleVuln: PHP 'snmp.c' Denial of Service Vulnerability
PHP 'snmp.c' Denial of Service Vulnerability
View ArticleVuln: PHP '/xmlrpc/libxmlrpc/simplestring.c' Heap Buffer Overflow Vulnerability
PHP '/xmlrpc/libxmlrpc/simplestring.c' Heap Buffer Overflow Vulnerability
View ArticleVuln: PHP 'zip_stream.c' Integer Overflow Vulnerability
PHP 'zip_stream.c' Integer Overflow Vulnerability
View ArticleVuln: Google Chrome Prior to 52.0.2743.82 Multiple Security Vulnerabilities
Google Chrome Prior to 52.0.2743.82 Multiple Security Vulnerabilities
View ArticleISC Stormcast For Tuesday, July 26th 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleVuln: XStream CVE-2016-3674 XML External Entity Multiple Information...
XStream CVE-2016-3674 XML External Entity Multiple Information Disclosure Vulnerabilities
View ArticleBugtraq: [SECURITY] [DSA 3629-1] ntp security update
[SECURITY] [DSA 3629-1] ntp security update
View ArticleBugtraq: July 2016 - Bamboo Server - Critical Security Advisory
July 2016 - Bamboo Server - Critical Security Advisory
View ArticleBugtraq: MySQL 0days followup (CVE-2016-3477) CVSS 8.1
MySQL 0days followup (CVE-2016-3477) CVSS 8.1
View ArticleVuln: GNU glibc 'misc/hsearch_r.c' Integer Overflow Vulnerability
GNU glibc 'misc/hsearch_r.c' Integer Overflow Vulnerability
View ArticleVuln: GNU glibc CVE-2015-8777 Local Security Bypass Vulnerability
GNU glibc CVE-2015-8777 Local Security Bypass Vulnerability
View ArticlePop star tells fans to send their Twitter passwords, but it might be illegal
Jack Johnson (right), is one of the singers in the pop-rap duo "Jack & Jack." (credit: genesiating) As a new way to connect with his fans, Jack Johnson—one half of the pop-rap duo Jack & Jack,...
View ArticleCommand and Control Channels Using "AAAA" DNS Records, (Tue, Jul 26th)
Dataexfiltrationand command and control channels via DNS are nothing new exactly. In many ways, DNS is an ideal covert channel. Even well-protected systems usually can connect to a recursive name...
View ArticleBugtraq: Crashing Browsers Remotely via Insecure Search Suggestions
Crashing Browsers Remotely via Insecure Search Suggestions
View ArticleBugtraq: Huawei ISM Professional XSS Vulnerability
Huawei ISM Professional XSS Vulnerability
View ArticleBugtraq: Dropbox 6.4.14 DLL Hijacking Vulnerability
Dropbox 6.4.14 DLL Hijacking Vulnerability
View ArticleVuln: Juniper Junos CVE-2016-1276 Multiple Denial of Service Vulnerabilities
Juniper Junos CVE-2016-1276 Multiple Denial of Service Vulnerabilities
View ArticleNew attack bypasses HTTPS protection on Macs, Windows, and Linux
(credit: Ddxc) A key guarantee provided by HTTPS encryption is that the addresses of visited websites aren't visible to attackers who may be monitoring an end user's network traffic. Now, researchers...
View ArticleVuln: PCRE Regular CVE-2015-8385 Pattern Handling Buffer Overflow Vulnerability
PCRE Regular CVE-2015-8385 Pattern Handling Buffer Overflow Vulnerability
View Article